How has information security changed over the past 20 years. Part 2
As mentioned in our previous article, before the main motive for hackers was a…
How has information security changed over the past 20 years
If you look at the program of any modern conference on information security,…
What is Continuous Delivery?
Continuous Delivery is a set of software development methods. It helps to…
Security tips: Docker
Docker containers are the most popular containerization technology. Initially,…
Statistics and monitoring of PHP scripts in real time. ClickHouse and Grafana will help Pinba
In this article, I’ll show you how to use pinba with clickhouse and grafana…
SIEM: correlation rules and their environment
Now let's look at the correlation rules themselves through the eyes of the…
SIEM: Expertise. Whose correlation rules are better
Many of those who know about SIEM are familiar with the development of…
DevOps: how can an IT team do important things and earn more
Let’s check why attempts to "implement DevOps" do not make sense without a…